Carsten Rudolph
Orcid: 0000-0001-9050-5675
According to our database1,
Carsten Rudolph
authored at least 127 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Vis. Comput., February, 2024
SAFE: Advancing Large Language Models in Leveraging Semantic and Syntactic Relationships for Software Vulnerability Detection.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Fostering Trust in Smart Inverters: A Framework for Firmware Update Management and Tracking in VPP Context.
CoRR, 2024
Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone?
CoRR, 2024
A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection.
CoRR, 2024
Resilient Automated Distributed Device Scheduling in Smart Grids under False Data Injection Attacks.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024
Utilizing Large Language Models with Human Feedback Integration for Generating Dedicated Warning for Phishing Emails.
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, 2024
Towards a Better Understanding of Cyber Awareness Amongst Migrant Communities in Australia.
Proceedings of the Wisdom, Well-Being, Win-Win, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Sensors, December, 2023
Comput. Networks, December, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Guarding the Grid: Enhancing Resilience in Automated Residential Demand Response Against False Data Injection Attacks.
CoRR, 2023
SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market.
CoRR, 2023
IEEE Access, 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
FDIAs on Hybrid Trading Transactive Energy Markets: Attacks, Impacts, and Prevention.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2023
Proceedings of the Information for a Better World: Normality, Virtuality, Physicality, Inclusivity, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning.
IEEE Trans. Parallel Distributed Syst., 2022
IEEE Trans. Inf. Forensics Secur., 2022
A Blockchain-Based Consent Mechanism for Access to Fitness Data in the Healthcare Context.
IEEE Access, 2022
R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
False Data Injection Attack Detection for Secure Distributed Demand Response in Smart Grids.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
NOTE: Unavoidable Service to Unnoticeable Risks: A Study on How Healthcare Record Management Opens the Doors of Unnoticeable Vulnerabilities for Rohingya Refugees.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022
2021
OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning.
CoRR, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Impact analysis of false data injection attacks in transactive energy market-based micro-grid systems.
Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies, 2021
Risk and Compliance in IoT- Health Data Propagation: A Security-Aware Provenance based Approach.
Proceedings of the IEEE International Conference on Digital Health, 2021
We Can Pay Less: Coordinated False Data Injection Attack Against Residential Demand Response in Smart Grids.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Inherent Vulnerability of Demand Response Optimisation against False Data Injection Attacks in Smart Grids.
Proceedings of the NOMS 2020, 2020
Robust Demand Response for Device Scheduling under False Data Injection Attacks in Smart Grids.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020
What Information is Required for Explainable AI? : A Provenance-based Research Agenda and Future Challenges.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020
2019
A Dynamic Access Control Policy Model for Sharing of Healthcare Data in Multiple Domains.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 2019 IEEE PES Innovative Smart Grid Technologies Europe, 2019
A Dynamic Cross-Domain Access Control Model for Collaborative Healthcare Application.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the 2019 IEEE International Conference on Web Services, 2019
Blockchain based Dynamic Patient Consent: A Privacy-Preserving Data Acquisition Architecture for Clinical Data Analytics.
Proceedings of the 40th International Conference on Information Systems, 2019
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019
Proceedings of the Australasian Computer Science Week Multiconference, 2019
Can I Trust the Data I See?: A Physician's Concern on Medical Data in IoT Health Architectures.
Proceedings of the Australasian Computer Science Week Multiconference, 2019
2017
Comput. Secur., 2017
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017
2016
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Comput. J., 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
2014
Dagstuhl Reports, 2014
Proceedings of the IEEE International Systems Conference, 2014
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Proceedings of the Software Engineering 2014, Fachtagung des GI-Fachbereichs Softwaretechnik, 25. Februar, 2014
Proceedings of the 2014 Information Security for South Africa, 2014
Integrity based relationships and trustworthy communication between network participants.
Proceedings of the IEEE International Conference on Communications, 2014
2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the SECRYPT 2013, 2013
Building Secure Systems Using a Security Engineering Process and Security Building Blocks.
Proceedings of the Software Engineering 2013 - Workshopband (inkl. Doktorandensymposium), Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar, 2013
Proceedings of the Software Engineering 2013: Fachtagung des GI-Fachbereichs Softwaretechnik, 26. Februar, 2013
Proceedings of the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security Research 2013, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the Software Engineering 2012: Fachtagung des GI-Fachbereichs Softwaretechnik, 27. Februar, 2012
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the 18th Asia-Pacific Conference on Communications, 2012
2011
Formal Notions of Trust and Confidentiality- Enabling Reasoning about System Security.
J. Inf. Process., 2011
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
2010
IEEE Trans. Biomed. Eng., 2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010
2009
Proceedings of the Security and Dependability for Ambient Intelligence, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Database and Expert Systems Applications, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of the 3rd International Workshop on Views On Designing Complex Architectures, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Computer Security, 2007
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007
2005
Formal Aspects Comput., 2005
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005
Proceedings of the Computer Security, 2005
2003
Proceedings of the 33. Jahrestagung der Gesellschaft für Informatik, Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit", INFORMATIK 2003 - Mit Sicherheit Informatik, Frankfurt am Main, Germany, September 29, 2003
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
2002
Proceedings of the Infrastructure Security, International Conference, 2002
Proceedings of the Formal Aspects of Security, First International Conference, 2002
Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
Analyse kryptographischer Protokolle mittels Produktnetzen basierend auf Modellannahmen der BAN-Logik.
GMD research series 13/1998, GMD, ISBN: 978-3-88457-333-4, 1998
1991
PhD thesis, 1991